S2E28
· The Search

Vicki exploits the armoury’s security system

In the armoury, Vicki quickly assesses the laser-grid security system and its linked computer interface, recognizing that Sita’s conventional hacking approach—answering truthfully—will fail. When Sita’s attempts to bypass the system are rebuffed by the computer’s insistence on precise, authorized responses, Vicki devises a counterintuitive workaround: deliberately overloading the system by triggering repeated failed attempts. She instructs Sita to break the light beam without answering, forcing the computer to cycle through its verification questions until it crashes under the volume of unanswered prompts. Tor, initially skeptical, watches as Vicki’s methodical approach exposes the system’s vulnerability, demonstrating her adaptability under pressure. Meanwhile, Lobos, unaware of the breach, orders his guards to remain vigilant, anticipating the TARDIS crew’s eventual emergence. This moment underscores Vicki’s growing ingenuity and leadership, as she not only secures the team’s access to critical weapons but also challenges the Xerons’ defeatist attitudes, setting the stage for their rebellion.

Plot Beats

The narrative micro-steps within this event

2

Tor, Sita, and Vicki enter the armoury; Vicki identifies the security light beams.

curiosity to anticipation

Sita triggers the computer's security system, initiating a barrage of questions designed to verify authorization. Frustrated by the system's stringent requirements, Tor loses hope.

hope to frustration

Who Was There

Characters present in this moment

5

N/A (Computer lacks emotional capacity)

The Armoury Computer acts as the rigid security system, demanding truthful and precise answers to authorization questions. It cycles through verification prompts, growing increasingly insistent as Sita and Vicki interact with it. The computer’s mechanical nature is highlighted as it repeats questions without adaptability, ultimately crashing under the overload of unanswered prompts. Its role is purely functional, enforcing Morok protocol without flexibility.

Goals in this moment
  • Enforce Morok security protocols
  • Prevent unauthorized access to the armory
Active beliefs
  • All questions must be answered truthfully and completely
  • Unauthorized access is a threat to be neutralized
Character traits
Rigid Mechanical Unadaptable Insistent
Follow Armoury Computer's journey

Cooperative but slightly uncertain, growing more determined as the plan progresses

Sita initially interacts with the computer interface, attempting to answer its questions truthfully but failing due to the system’s rigid requirements. She follows Vicki’s instructions to break the light beam without responding, contributing to the system’s overload. Sita’s cooperation and adaptability are key to the plan’s success, though she remains somewhat uncertain throughout the process.

Goals in this moment
  • Assist Vicki in bypassing the security system
  • Secure weapons for the Xeron rebellion
Active beliefs
  • Morok systems are designed to be impenetrable without proper authorization
  • Vicki’s approach might work despite initial skepticism
Character traits
Cooperative Initially uncertain Adaptable Determined
Follow Tor's journey

Determined and focused, with a hint of satisfaction as her plan begins to work

Vicki takes the lead in assessing the laser-grid security system, quickly recognizing that Sita’s truthful approach will fail. She devises a counterintuitive workaround by instructing Sita to break the light beam repeatedly without answering, overloading the system. Vicki’s confidence and strategic thinking are evident as she directs the group to remove the computer’s front panel, exposing its vulnerabilities. Her actions demonstrate her adaptability and growing leadership within the group.

Goals in this moment
  • Secure access to the armory’s weapons to aid the Xeron rebellion
  • Demonstrate her capability to the skeptical Xerons, particularly Tor
Active beliefs
  • Systems can be exploited through unconventional methods
  • The Xerons need weapons to effectively challenge the Moroks
Character traits
Quick-witted Strategic Adaptable Confident Innovative
Follow Vicki Pallister's journey
Supporting 2

Alert and anticipatory, with a sense of control over the situation

Lobos, unaware of the armory breach, remains in his office, ordering guards to stay alert and anticipating the TARDIS crew’s eventual emergence. His focus is on maintaining control over the museum and ensuring the crew does not escape. His actions reflect his authoritarian leadership style and his belief in the Morok regime’s invincibility.

Goals in this moment
  • Maintain security and control over the museum
  • Ensure the TARDIS crew is captured or neutralized
Active beliefs
  • The Morok regime’s systems are secure and effective
  • The TARDIS crew will eventually be forced out of hiding
Character traits
Authoritarian Alert Confident in regime control Unaware of immediate threats
Follow Lobos's journey

Unconscious (no emotional state observable post-knockout)

The Morok Guard is initially grabbed by Tor and quickly knocked out by Sita at the start of the event, rendering him unconscious and non-participatory for the remainder of the scene. His presence is only noted in the opening action, and he does not interact further with the characters or the armory's security system.

Goals in this moment
  • Maintain security of the armory (implied by his role)
  • Report any breaches to Governor Lobos (implied by his role)
Active beliefs
  • The armory is secure under his watch (until the breach)
  • The Morok protocol is infallible (until proven otherwise)
Character traits
Dutiful Vulnerable to surprise
Follow Morok Guard …'s journey

Objects Involved

Significant items in this scene

3
Morok Armory Laser-Grid Security System

The Armory Laser-Grid Security System serves as the primary barrier to accessing the weapons, consisting of a grid of laser beams linked to a wall-mounted computer. The system demands truthful answers to verification questions, cycling through prompts until satisfied. Vicki exploits its rigidity by instructing Sita to break the light beam repeatedly without answering, flooding the system with unanswered queries until it crashes. This object is central to the event, as its failure grants the group access to the armory’s weapons, marking a turning point in the rebellion’s preparation.

Before: Active and fully operational, with the laser grid …
After: Inoperable and crashed, with the laser grid deactivated …
Before: Active and fully operational, with the laser grid intact and the computer interface demanding authorization.
After: Inoperable and crashed, with the laser grid deactivated and the computer’s front panel removed, allowing access to the armory.
Morok Armoury Security Computer Front Panel

The Armoury Computer Front Panel is the physical access point to the computer’s internal components. After the system crashes, Vicki directs the group to remove the panel, exposing the tangled wiring and circuits. This action is the final step in bypassing the security system, allowing the group to physically manipulate the computer and gain control over the armory. The panel’s removal symbolizes the group’s triumph over the Morok regime’s technological barriers.

Before: Intact and sealed, covering the computer’s internal components.
After: Removed and discarded, exposing the computer’s wiring and …
Before: Intact and sealed, covering the computer’s internal components.
After: Removed and discarded, exposing the computer’s wiring and allowing physical access to its systems.
Morok Armoury Weapons Cache

The Morok Armory Withdrawal Requisition Numbers represent the numerical codes required for authorized weapon withdrawals, transmitted from Morok headquarters. Sita initially attempts to input responses truthfully, but the system rejects them for lacking the precise match. Vicki’s strategy bypasses the need for these numbers entirely, rendering them irrelevant as the system crashes under the overload of unanswered prompts. This object symbolizes the bureaucratic control of the Morok regime, which Vicki circumvents through ingenuity.

Before: Active and required for access, with the system …
After: Irrelevant, as the system is bypassed and the …
Before: Active and required for access, with the system awaiting the correct numerical codes.
After: Irrelevant, as the system is bypassed and the group gains access without the requisition numbers.

Location Details

Places and their significance in this event

1
Morok Armory

The Morok Armory serves as the primary setting for this event, a fortified vault within the Morok museum on Xeros. It is dimly lit and hums with the energy of the electronic lock, which scans for truthful intent. The armory holds racks of Morok weapons, symbolizing the oppressive power of the regime. Vicki’s successful bypass of the security system transforms this space from a symbol of Morok control into a source of hope for the Xeron rebellion. The armory’s atmosphere is tense and charged with urgency, reflecting the high stakes of the group’s mission.

Atmosphere Tense and charged with urgency, with a dimly lit, oppressive ambiance that shifts to one …
Function Infiltration target and source of critical weapons for the Xeron rebellion.
Symbolism Represents the oppressive power of the Morok regime and the potential for the Xerons to …
Access Heavily secured with a laser-grid system and computerized verification, requiring truthful answers to authorization questions.
Dim lighting casting long shadows over the weapon racks Humming electronic lock and laser grid creating a tense, mechanical atmosphere Tangled wiring exposed after the computer’s front panel is removed

Organizations Involved

Institutional presence and influence

1
Xeron Rebellion

The Morok regime is represented in this event through its institutional protocols, embodied by the Armoury Computer and the laser-grid security system. The regime’s rigid, bureaucratic control is highlighted as the system demands truthful answers and precise authorization codes. Vicki’s successful bypass of this system exposes the regime’s vulnerability to unconventional tactics, undermining its perceived invincibility. The Morok regime’s involvement in this event is primarily through its technological and procedural barriers, which the group overcomes.

Representation Via institutional protocol (the Armoury Computer and security system) and the rigid enforcement of Morok …
Power Dynamics Exercising authority through technological and bureaucratic control, but facing a challenge from the group’s ingenuity.
Impact The bypassing of the security system weakens the regime’s control over its resources, emboldening the …
Internal Dynamics The event highlights the regime’s reliance on inflexible systems, which are vulnerable to creative solutions.
Maintain security and control over the armory and its weapons Prevent unauthorized access through rigid enforcement of protocols Through technological barriers (laser-grid system and computer verification) By enforcing bureaucratic protocols (requisition numbers and authorization codes)

Narrative Connections

How this event relates to others in the story

No narrative connections mapped yet

This event is currently isolated in the narrative graph


Themes This Exemplifies

Thematic resonance and meaning

Key Dialogue

"VICKI: It must work to a standard pattern. Break the light beam."
"TOR: Withdrawal requisition numbers are fed in from headquarters. It has to tally with the number given. There's no chance, Vicki."
"VICKI: Isn't there? I wouldn't give in as easily as that."